ITN 101: Pre-Assessment Quiz

Ace your homework & exams now with Quizwiz!

The head office of Vojks Telecommunications runs on a standard WLAN network, and it has hired Jim as a network administrator to upgrade its network to faster standards. On inspection, Jim realizes that a throughput of 50 Mbps should be sufficient for the smooth functioning of the office. The only request Vojks has made to Jim is to ensure that the older computers still have wireless access during the upgrade. Analyze which of the following standards Jim should use in this scenario. a. 802.11a b. 802.11g c. 802.11n d. 802.11b

802.11g was designed to be just as affordable as 802.11b while increasing its maximum theoretical throughput with different data modulation techniques. 802.11g benefits from being compatible with 802.11b networks that allow older computers to have wireless access during an upgrade.

You have been appointed as the network administrator of an ISP. Your first project requires you to develop a protocol that can transmit IP and other kinds of messages through a tunnel so that you can connect two VPN endpoints. Which of the following will you choose in this scenario? a. IKEv2 b. L2TP c. OpenVPN d. GRE

GRE (Generic Routing Encapsulation) is a layer 3 protocol that is used to transmit IP and other kinds of messages through a tunnel and should be used in this instance.

Which of the following security threats requires a PIN (personal identification number) to access an AP's settings or to associate a new device with a network? a. War chalking b. WPS attack c. War driving d. WPA attack

WPS (Wi-Fi Protected Setup) requires a PIN (personal identification number) to access an AP's settings or to associate a new device with a network.

You have been hired as an assistant to the head network administrator in an ISP (Internet service provider). He wants you to disable the STP (Spanning Tree Protocol) in the demarc port of one of the clients in order to prevent the ISP's WAN topology from mixing with the corporate network's topology. Which of the following will you use in this scenario to complete the task at hand? a. A root guard b. A BPDU filter c. A root bridge d. A BPDU guard

A BPDU filter disables STP on specific ports, so it should be used in this scenario to disable the demarc port.

Jasmine has been working as the chief accountant for Basil Ltd., which sells basil leaves in Datona. Henry, who is the network administrator, has recently discovered that Jasmine is actually the same person who creates as well as authorizes the vendor account payments. Analyze if any of the following agreements has been violated in this scenario. a. AUP b. PUA c. Anti-malware policy d. NDA

A PUA (privileged user agreement), or privileged access agreement, addresses the specific concerns related to privileged access given to administrators and certain support staff.

Mojaro Bank at Datona has contacted Vincent, a network provider, to provide Mojaro with a network connection that will enable it to securely conduct financial transactions with the other branches situated across various states in the United States as well as with the International Monetary Fund. Analyze which of the following connections would be best suited in this scenario. a. LAN b. CAN c. MAN d. WAN

A WAN (wide area network) traverses a significant distance and usually supports very high data throughput. A WAN is more feasible when you need a wider geographical area.

Neon Printers has set up a full network of laptops for the purpose of running multiple printing projects simultaneously. It has contracted Theo Solutions to provide network security solutions while protecting its network from certain traffic. Analyze which of the following is best applicable in this scenario. a. Using a host-based firewall b. Using a proxy server c. Using an HIDS d. Using a network-based firewall

A network-based firewall should be used to protect an entire network and not just a solitary device and hence is ideal in this scenario.

The IT department of Maddison Corporates has complained about a faulty fiber-optic cable as a result of which it is having connectivity issues within the organization. As a network engineer, you want to detect the faulty cable by searching for electrical signals in the cables located within the racks in the data room. Which of the following instruments will you need in this scenario? a. TDR b. OPM c. Tone generator d. Tone locator

A tone locator is a device that emits an audible tone when it detects electrical activity on a wire and hence should be used in this scenario.

Nathan, a network engineer, has been contracted by a company to fix an error that has led to an increase in network latency during conference calls with various clients. Analyze the way to correctly diagnose this issue. a. By calculating the error rate b. By checking if the network is operating at maximum capacity c. By checking if the connection has any jitter d. By checking the interface statistics of the network

All packets experience some latency. When successive packets experience varying amounts of latency, resulting in their arriving out of order, the user experience is degraded. This is called jitter, a problem that can be addressed through traffic management techniques.

Which of the following documents defines the terms of future contracts between parties, such as payment terms or arbitration arrangements? a. MSA b. SOW c. SLA d. MOU

An MSA (master service agreement) is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements.

You have recently been hired to complete a pending networking project where the cabling procedure providing Fast Ethernet has already been completed. On inspection, you realize that TIA/EIA-568 Category 5 twisted pair has been used for the cabling procedure. What is the maximum bandwidth that you will allot with such a pair of wires in this scenario? a. 10 Mbps b. 1000 Mbps (1 Gbps, Gigabit Ethernet) c. 100 Mbps (Fast Ethernet) d. 10 Gbps

Cat 5 twisted pairs can support a maximum bandwidth of 100 Mbps and hence should be used in this scenario.

JK Fabrics has contracted you to set up a unit for storing the routers and various switches that are to be used in setting up the network connection. Which of the following do you think is ideally suited in this scenario? a. VoIP b. IDF c. Patch panel d. Racks

Correct. Racks are used to hold various network equipment such as servers, switches, and firewalls.

Probiotic is a company that sells packaged milk through online portals. Recently, the company received a generous funding with which it plans on establishing a separate floor for the Finance department within the building. The network administrator requests you to submit a network document after subdividing the smaller network for Finance into a separate network segment so that the transmissions in broadcast domains are limited to each network and there is less possibility of hackers or malware reaching remote, protected networks in the enterprise domain. Identify under which of the following groupings will you place this network segment in this scenario? a. Departmental boundaries b. VLAN groups c. Device types d. Geographic locations

Departmental boundaries will include the Accounting, Human Resources, and Sales departments, so it should be grouped under this in this scenario.

Whistle Blowers, a talent management company, wants to set up a network connection for its branch office in Los Angeles. It has contracted Vince Cabling Solutions for this. The administration department of Whistle Blowers has specifically mentioned that the nodes of the devices used in the division should all be connected through a common cable so that the material costs can be minimized. Analyze which topology Vince Cabling Solutions should use in such a scenario. a. A star topology b. A mesh topology c. A ring topology d. A bus topology

In a bus topology, all the devices are connected through a single cable instead of a central hub. It is also least expensive amongst other topologies and hence should be preferred in this scenario.

In the formula 2h - 2 = Z, what does h represent? a. h equals the number of bits that must be switched from the host address to the network ID. b. h equals the number of bits remaining in the host portion. c. h equals the number of subnets that result. d. h equals the number of hosts available in each subnet.

In the formula, 2h - 2 = Z, h equals the number of bits remaining in the host portion.

A client has complained of losing Internet connectivity. You as a network engineer troubleshoot the error, and you find that the source of the error is the computer's wired connection. You decide to solve the issue by replacing the wired connection with a wireless one. What kind of an issue are you resolving in this scenario? a. Interference b. DNS issues c. Interface errors d. Router misconfiguration

Misconfigured interfaces, such as an incorrect default gateway or missing DNS server addresses, can result in interface errors. One possible evaluation technique for bypassing an interface error, which will help confirm that the interface misconfiguration is the issue, is to switch to a different interface on the same device.

Which cloud characteristic allows resources to be changed quickly and dynamically, even automatically in response to changing demands? a. Measured service b. Rapid elasticity c. Resource pooling d. Broad network access

Rapid elasticity means resources can be changed quickly and dynamically, even automatically in response to changing demands.

Godwin Pharmaceuticals has a private web server for its corporate network that runs on a Linux operating system. You have been contacted to make its network remotely accessible to the IT department so that the IT department can have secure access to the workstations and, at the same time, the transmissions remain encrypted. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server? a. Telnet b. POP3 c. RDP d. SSH

SSH (Secure Shell) protocols are mostly used for Linux operating systems to provide a secure remote access to the networks, so this protocol should be used in this situation because the system is running on Linux.

You are a network manager who wants to distribute sensitive privileges and responsibilities to different persons so that no single person can singlehandedly compromise the security of data and resources. Which authorization method will you apply in this scenario? a. SoD b. MAC c. RBAC d. DAC

SoD (separation of duties) refers to a division of labor that ensures no one person can single handedly compromise the security of data, finances, or other resources.

In which of the following forms of attack can security flaws allow unauthorized users to gain access to the system? a. On-path attack b. Deauth attack c. Back doors d. DNS poisoning

Software might contain back doors, which are security flaws that allow unauthorized users to gain access to the system.

The University of Bethesda has requested your professional help in giving a masterclass on how to use Telnet ports for interacting with remote computers. Which of the following ports will you open to teach students how to establish an unencrypted connection with a remote computer? a. 443 b. 80 c. 23 d. 22

Telnet uses this port for unencrypted control of remote computers, so this port will be used in this case.

Michigan Tires has hired you as a network administrator to monitor the network and to ensure that the network functions reliably. You will require a device to monitor the CPU temperatures of your servers. Which of the following software will you request from the management? a. Wireshark b. Spiceworks c. PRTG dashboard by Paessler d. Room Alert Monitor by AVTECH

The data regarding CPU temperatures for your servers can be collected and monitored using the PRTG dashboard by Paessler.

Which of the following command-line tools is used to query DNS name servers for information about host addresses and other DNS records? a. ip b. dig c. ipconfig d. ping

The dig utility is used to query DNS name servers for information about host addresses and other DNS records.

Which of the following fields in a TCP segment identifies the data segment's position in the stream of data segments being sent? a. Reserved b. Source port c. Sequence number d. Acknowledgment number

The sequence number in a TCP segment identifies the data segment's position in the stream of data segments being sent.


Related study sets

Chemical Reactions and Stoichiometry

View Set

Life and Health - Chapter 4 Quiz - Life Policy Provisions and Options

View Set

Intro to Philosophy- ALL TEST QUESTIONS- Brother David

View Set

Chapter 12 Paying for Government

View Set